Sciweavers

1898 search results - page 198 / 380
» Weak Keys for IDEA
Sort
View
164
Voted
EDUTAINMENT
2006
Springer
15 years 7 months ago
3D Body Reconstruction from Photos Based on Range Scan
Abstract. We present a data-driven shape model for reconstructing human body models from one or more 2D photos. One of the key tasks in reconstructing the 3D model from image data ...
Hyewon Seo, Young In Yeo, KwangYun Wohn
133
Voted
SIGCOMM
2000
ACM
15 years 7 months ago
Trajectory sampling for direct traffic observation
Traffic measurement is a critical component for the control and engineering of communication networks. We argue that traffic measurement should make it possible to obtain the spati...
Nick G. Duffield, Matthias Grossglauser
124
Voted
WSC
2007
15 years 6 months ago
Building composable bridges between the conceptual space and the implementation space
Often the process and effort in building interoperable Command and Control (C2) systems and simulations can be arduous. Invariably the difficulty is in understanding what is inten...
Paul Gustavson, Tram Chase
116
Voted
AMAST
2008
Springer
15 years 5 months ago
System Demonstration of Spiral: Generator for High-Performance Linear Transform Libraries
We demonstrate Spiral, a domain-specific library generation system. Spiral generates high performance source code for linear transforms (such as the discrete Fourier transform and ...
Yevgen Voronenko, Franz Franchetti, Fréd&ea...
133
Voted
ISPEC
2010
Springer
15 years 5 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...